@zerothreatai/vulnerability-registry 3.0.0 → 5.0.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (77) hide show
  1. package/dist/categories/authentication.js +34 -17
  2. package/dist/categories/configuration.js +561 -60
  3. package/dist/categories/injection.js +68 -34
  4. package/dist/categories/sensitive-paths.js +168 -84
  5. package/dist/categories/ssrf.js +22 -11
  6. package/dist/categories/xss.js +30 -15
  7. package/dist/category.d.ts +6 -0
  8. package/dist/category.js +15 -0
  9. package/dist/error-codes.d.ts +20 -0
  10. package/dist/error-codes.js +20 -0
  11. package/dist/index.d.ts +9 -1
  12. package/dist/index.js +5 -1
  13. package/dist/scanner.d.ts +6 -0
  14. package/dist/scanner.js +22 -0
  15. package/dist/types.d.ts +2 -0
  16. package/dist-cjs/categories/authentication.js +34 -17
  17. package/dist-cjs/categories/configuration.js +561 -60
  18. package/dist-cjs/categories/injection.js +68 -34
  19. package/dist-cjs/categories/sensitive-paths.js +168 -84
  20. package/dist-cjs/categories/ssrf.js +22 -11
  21. package/dist-cjs/categories/xss.js +30 -15
  22. package/dist-cjs/category.js +18 -0
  23. package/dist-cjs/error-codes.js +20 -0
  24. package/dist-cjs/index.js +7 -1
  25. package/dist-cjs/scanner.js +25 -0
  26. package/package.json +35 -32
  27. package/scripts/assign-ids.ts +105 -0
  28. package/scripts/check-duplicate-ids.ts +45 -0
  29. package/src/categories/authentication.ts +145 -128
  30. package/src/categories/configuration.ts +1632 -1111
  31. package/src/categories/injection.ts +158 -124
  32. package/src/categories/sensitive-paths.ts +168 -84
  33. package/src/categories/ssrf.ts +22 -11
  34. package/src/categories/xss.ts +30 -15
  35. package/src/category.ts +16 -0
  36. package/src/error-codes.ts +25 -5
  37. package/src/id-registry.json +1235 -0
  38. package/src/index.ts +20 -14
  39. package/src/scanner.ts +23 -0
  40. package/src/types.ts +4 -2
  41. package/zerothreatai-vulnerability-registry-4npm .0.0.tgz +0 -0
  42. package/src/categories/authentication.d.ts +0 -8
  43. package/src/categories/authentication.d.ts.map +0 -1
  44. package/src/categories/authentication.js +0 -378
  45. package/src/categories/authentication.js.map +0 -1
  46. package/src/categories/configuration.d.ts +0 -8
  47. package/src/categories/configuration.d.ts.map +0 -1
  48. package/src/categories/configuration.js +0 -906
  49. package/src/categories/configuration.js.map +0 -1
  50. package/src/categories/injection.d.ts +0 -8
  51. package/src/categories/injection.d.ts.map +0 -1
  52. package/src/categories/injection.js +0 -750
  53. package/src/categories/injection.js.map +0 -1
  54. package/src/categories/sensitive-paths.d.ts +0 -9
  55. package/src/categories/sensitive-paths.d.ts.map +0 -1
  56. package/src/categories/sensitive-paths.js +0 -1791
  57. package/src/categories/sensitive-paths.js.map +0 -1
  58. package/src/categories/ssrf.d.ts +0 -8
  59. package/src/categories/ssrf.d.ts.map +0 -1
  60. package/src/categories/ssrf.js +0 -250
  61. package/src/categories/ssrf.js.map +0 -1
  62. package/src/categories/xss.d.ts +0 -7
  63. package/src/categories/xss.d.ts.map +0 -1
  64. package/src/categories/xss.js +0 -328
  65. package/src/categories/xss.js.map +0 -1
  66. package/src/error-codes.d.ts +0 -242
  67. package/src/error-codes.d.ts.map +0 -1
  68. package/src/error-codes.js +0 -315
  69. package/src/error-codes.js.map +0 -1
  70. package/src/index.d.ts +0 -60
  71. package/src/index.d.ts.map +0 -1
  72. package/src/index.js +0 -107
  73. package/src/index.js.map +0 -1
  74. package/src/types.d.ts +0 -86
  75. package/src/types.d.ts.map +0 -1
  76. package/src/types.js +0 -7
  77. package/src/types.js.map +0 -1
@@ -13,11 +13,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
13
13
  // CRITICAL - CREDENTIAL EXPOSURE
14
14
  // ========================================
15
15
  [error_codes_js_1.VulnerabilityCode.SENS_CRIT_AWS_CREDENTIALS]: {
16
- id: 88,
16
+ id: 500,
17
17
  code: error_codes_js_1.VulnerabilityCode.SENS_CRIT_AWS_CREDENTIALS,
18
18
  title: 'AWS Credentials Exposed',
19
19
  description: 'AWS credentials file (.aws/credentials) is publicly accessible containing AWS Access Key ID and Secret Access Key, enabling complete access to AWS services including S3 buckets, EC2 instances, RDS databases, and all cloud resources associated with the compromised account.',
20
20
  severity: 'critical',
21
+ levelId: 1,
21
22
  category: 'information_disclosure',
22
23
  scanner: 'sensitive-path-scout',
23
24
  cvss: {
@@ -35,11 +36,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
35
36
  remediation: 'Immediately rotate all exposed AWS credentials. Remove credentials from web-accessible paths. Use IAM roles for EC2 instances. Implement AWS Secrets Manager for credential storage.',
36
37
  },
37
38
  [error_codes_js_1.VulnerabilityCode.SENS_CRIT_SSH_PRIVATE_KEY]: {
38
- id: 89,
39
+ id: 501,
39
40
  code: error_codes_js_1.VulnerabilityCode.SENS_CRIT_SSH_PRIVATE_KEY,
40
41
  title: 'SSH Private Key Exposed',
41
42
  description: 'SSH private key file (id_rsa, id_ed25519) is publicly accessible, allowing attackers to authenticate to any system where the corresponding public key is authorized, potentially including production servers, databases, and version control systems.',
42
43
  severity: 'critical',
44
+ levelId: 1,
43
45
  category: 'information_disclosure',
44
46
  scanner: 'sensitive-path-scout',
45
47
  cvss: {
@@ -56,11 +58,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
56
58
  remediation: 'Immediately revoke and regenerate all SSH key pairs. Remove key files from web-accessible paths. Audit authorized_keys on all systems. Block access to .ssh directories in web server config.',
57
59
  },
58
60
  [error_codes_js_1.VulnerabilityCode.SENS_CRIT_SSL_PRIVATE_KEY]: {
59
- id: 90,
61
+ id: 502,
60
62
  code: error_codes_js_1.VulnerabilityCode.SENS_CRIT_SSL_PRIVATE_KEY,
61
63
  title: 'SSL/TLS Private Key Exposed',
62
64
  description: 'SSL/TLS private key file is publicly accessible, enabling attackers to decrypt all HTTPS traffic, perform man-in-the-middle attacks, and impersonate the server for phishing or credential theft operations against legitimate users.',
63
65
  severity: 'critical',
66
+ levelId: 1,
64
67
  category: 'cryptographic',
65
68
  scanner: 'sensitive-path-scout',
66
69
  cvss: {
@@ -77,11 +80,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
77
80
  remediation: 'Immediately revoke the SSL certificate and generate new key pair. Remove private keys from web-accessible directories. Store keys outside webroot with restricted permissions.',
78
81
  },
79
82
  [error_codes_js_1.VulnerabilityCode.SENS_CRIT_RAILS_MASTER_KEY]: {
80
- id: 91,
83
+ id: 503,
81
84
  code: error_codes_js_1.VulnerabilityCode.SENS_CRIT_RAILS_MASTER_KEY,
82
85
  title: 'Rails Master Key Exposed',
83
86
  description: 'Rails master.key file is publicly accessible, allowing decryption of all Rails encrypted credentials including database passwords, API keys, and session secrets, enabling complete application compromise and access to all encrypted secrets.',
84
87
  severity: 'critical',
88
+ levelId: 1,
85
89
  category: 'information_disclosure',
86
90
  scanner: 'sensitive-path-scout',
87
91
  cvss: {
@@ -98,11 +102,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
98
102
  remediation: 'Regenerate Rails master key immediately. Rotate all credentials encrypted with the old key. Remove master.key from version control and web-accessible paths. Use environment variables.',
99
103
  },
100
104
  [error_codes_js_1.VulnerabilityCode.SENS_CRIT_TERRAFORM_STATE]: {
101
- id: 92,
105
+ id: 504,
102
106
  code: error_codes_js_1.VulnerabilityCode.SENS_CRIT_TERRAFORM_STATE,
103
107
  title: 'Terraform State File Exposed',
104
108
  description: 'Terraform state file (tfstate) is publicly accessible containing complete infrastructure configuration, resource IDs, IP addresses, and potentially sensitive outputs including database passwords and API keys stored in plain text.',
105
109
  severity: 'critical',
110
+ levelId: 1,
106
111
  category: 'information_disclosure',
107
112
  scanner: 'sensitive-path-scout',
108
113
  cvss: {
@@ -119,11 +124,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
119
124
  remediation: 'Remove state files from web-accessible paths. Use remote state backends (S3, GCS, Azure) with encryption. Rotate any credentials found in state file. Enable state encryption.',
120
125
  },
121
126
  [error_codes_js_1.VulnerabilityCode.SENS_CRIT_KUBE_CONFIG]: {
122
- id: 93,
127
+ id: 505,
123
128
  code: error_codes_js_1.VulnerabilityCode.SENS_CRIT_KUBE_CONFIG,
124
129
  title: 'Kubernetes Config Exposed',
125
130
  description: 'Kubernetes kubeconfig file is publicly accessible containing cluster credentials, certificates, and tokens that allow full administrative access to Kubernetes clusters including ability to deploy, modify, and delete all workloads.',
126
131
  severity: 'critical',
132
+ levelId: 1,
127
133
  category: 'information_disclosure',
128
134
  scanner: 'sensitive-path-scout',
129
135
  cvss: {
@@ -140,11 +146,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
140
146
  remediation: 'Immediately revoke exposed service account tokens and certificates. Rotate cluster credentials. Remove config from web paths. Use RBAC with minimal permissions.',
141
147
  },
142
148
  [error_codes_js_1.VulnerabilityCode.SENS_CRIT_VAULT_SECRET]: {
143
- id: 94,
149
+ id: 506,
144
150
  code: error_codes_js_1.VulnerabilityCode.SENS_CRIT_VAULT_SECRET,
145
151
  title: 'HashiCorp Vault Secret Exposed',
146
152
  description: 'HashiCorp Vault secrets or root token exposed, providing access to the centralized secrets management system and all secrets stored within, potentially compromising hundreds of application credentials and encryption keys.',
147
153
  severity: 'critical',
154
+ levelId: 1,
148
155
  category: 'information_disclosure',
149
156
  scanner: 'sensitive-path-scout',
150
157
  cvss: {
@@ -164,11 +171,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
164
171
  // HIGH - SOURCE CODE & CONFIG EXPOSURE
165
172
  // ========================================
166
173
  [error_codes_js_1.VulnerabilityCode.SENS_HIGH_GIT_EXPOSED]: {
167
- id: 95,
174
+ id: 507,
168
175
  code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_GIT_EXPOSED,
169
176
  title: 'Git Repository Exposed',
170
177
  description: 'Git repository metadata (.git/HEAD, .git/config) is publicly accessible, allowing attackers to download the complete repository including all source code, commit history, configuration files, and potentially credentials committed accidentally.',
171
178
  severity: 'high',
179
+ levelId: 2,
172
180
  category: 'information_disclosure',
173
181
  scanner: 'sensitive-path-scout',
174
182
  cvss: {
@@ -185,11 +193,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
185
193
  remediation: 'Block access to .git directory in web server configuration. Remove .git from production deployments. Audit git history for accidentally committed secrets.',
186
194
  },
187
195
  [error_codes_js_1.VulnerabilityCode.SENS_HIGH_ENV_FILE]: {
188
- id: 96,
196
+ id: 508,
189
197
  code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_ENV_FILE,
190
198
  title: 'Environment File Exposed',
191
199
  description: 'Environment configuration file (.env, .env.local, .env.production) is publicly accessible containing application secrets, database credentials, API keys, and other sensitive configuration that should never be exposed to end users.',
192
200
  severity: 'high',
201
+ levelId: 2,
193
202
  category: 'information_disclosure',
194
203
  scanner: 'sensitive-path-scout',
195
204
  cvss: {
@@ -206,11 +215,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
206
215
  remediation: 'Remove .env files from web-accessible directories. Block access to dotfiles in web server config. Rotate all credentials found in exposed files. Use secrets management services.',
207
216
  },
208
217
  [error_codes_js_1.VulnerabilityCode.SENS_HIGH_WORDPRESS_CONFIG]: {
209
- id: 97,
218
+ id: 509,
210
219
  code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_WORDPRESS_CONFIG,
211
220
  title: 'WordPress Configuration File Exposed',
212
221
  description: 'WordPress wp-config.php file is accessible and readable, exposing database credentials, authentication keys, salts, table prefix, and debug settings that allow complete compromise of the WordPress installation and underlying database.',
213
222
  severity: 'high',
223
+ levelId: 2,
214
224
  category: 'information_disclosure',
215
225
  scanner: 'sensitive-path-scout',
216
226
  cvss: {
@@ -227,11 +237,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
227
237
  remediation: 'Ensure PHP is properly configured to execute .php files rather than serve them as text. Move wp-config.php above the web root. Change database credentials immediately.',
228
238
  },
229
239
  [error_codes_js_1.VulnerabilityCode.SENS_HIGH_SPRING_ACTUATOR]: {
230
- id: 98,
240
+ id: 510,
231
241
  code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_SPRING_ACTUATOR,
232
242
  title: 'Spring Boot Actuator Endpoints Exposed',
233
243
  description: 'Spring Boot Actuator management endpoints are publicly accessible without authentication, exposing application internals including environment variables, configuration properties, health status, thread dumps, and potentially enabling remote code execution through certain endpoints.',
234
244
  severity: 'high',
245
+ levelId: 2,
235
246
  category: 'information_disclosure',
236
247
  scanner: 'sensitive-path-scout',
237
248
  cvss: {
@@ -249,11 +260,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
249
260
  remediation: 'Secure actuator endpoints with authentication. Disable sensitive endpoints in production. Use separate management port accessible only internally. Apply principle of least exposure.',
250
261
  },
251
262
  [error_codes_js_1.VulnerabilityCode.SENS_HIGH_SPRING_HEAPDUMP]: {
252
- id: 99,
263
+ id: 511,
253
264
  code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_SPRING_HEAPDUMP,
254
265
  title: 'Spring Boot Heapdump Exposed',
255
266
  description: 'Spring Boot Actuator heapdump endpoint is accessible allowing download of JVM heap memory containing sensitive runtime data including session tokens, passwords, encryption keys, personal data, and other secrets temporarily held in application memory.',
256
267
  severity: 'critical',
268
+ levelId: 1,
257
269
  category: 'information_disclosure',
258
270
  scanner: 'sensitive-path-scout',
259
271
  cvss: {
@@ -270,11 +282,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
270
282
  remediation: 'Disable heapdump endpoint in production (management.endpoint.heapdump.enabled=false). Require authentication for all actuator endpoints. Invalidate all active sessions.',
271
283
  },
272
284
  [error_codes_js_1.VulnerabilityCode.SENS_HIGH_PHPINFO]: {
273
- id: 100,
285
+ id: 512,
274
286
  code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_PHPINFO,
275
287
  title: 'PHP Info Page Exposed',
276
288
  description: 'PHP info page (phpinfo.php) is publicly accessible revealing complete server configuration including PHP version, loaded modules, environment variables, system paths, and potentially database connection strings that aid attackers in planning targeted attacks.',
277
289
  severity: 'medium',
290
+ levelId: 3,
278
291
  category: 'information_disclosure',
279
292
  scanner: 'sensitive-path-scout',
280
293
  cvss: {
@@ -291,11 +304,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
291
304
  remediation: 'Remove phpinfo files from production servers. If needed for debugging, protect with authentication or IP restrictions. Delete all debug and test files before deployment.',
292
305
  },
293
306
  [error_codes_js_1.VulnerabilityCode.SENS_HIGH_LARAVEL_DEBUG]: {
294
- id: 101,
307
+ id: 513,
295
308
  code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_LARAVEL_DEBUG,
296
309
  title: 'Laravel Debug Mode Enabled',
297
310
  description: 'Laravel application is running with debug mode enabled in production, exposing detailed stack traces, database queries, environment variables, and potentially the APP_KEY which can be used to decrypt session data and forge authenticated sessions.',
298
311
  severity: 'high',
312
+ levelId: 2,
299
313
  category: 'information_disclosure',
300
314
  scanner: 'sensitive-path-scout',
301
315
  cvss: {
@@ -312,11 +326,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
312
326
  remediation: 'Set APP_DEBUG=false in production environment. Rotate APP_KEY if exposed. Implement proper error logging that does not expose internals to users.',
313
327
  },
314
328
  [error_codes_js_1.VulnerabilityCode.SENS_HIGH_GRAPHQL_INTROSPECTION]: {
315
- id: 102,
329
+ id: 514,
316
330
  code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_GRAPHQL_INTROSPECTION,
317
331
  title: 'GraphQL Introspection Enabled',
318
332
  description: 'GraphQL API has introspection enabled in production, allowing attackers to query the complete schema including all types, queries, mutations, and fields, which reveals the entire API structure and aids in discovering sensitive operations and data access points.',
319
333
  severity: 'medium',
334
+ levelId: 3,
320
335
  category: 'information_disclosure',
321
336
  scanner: 'sensitive-path-scout',
322
337
  cvss: {
@@ -333,11 +348,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
333
348
  remediation: 'Disable introspection in production (introspection: false in Apollo Server). Implement query depth limiting and complexity analysis. Use persisted queries.',
334
349
  },
335
350
  [error_codes_js_1.VulnerabilityCode.SENS_HIGH_DATABASE_BACKUP]: {
336
- id: 103,
351
+ id: 515,
337
352
  code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_DATABASE_BACKUP,
338
353
  title: 'Database Backup File Exposed',
339
354
  description: 'Database backup or dump file (.sql, .dump, .bak) is publicly accessible containing complete database contents including user credentials, personal information, business data, and all other stored information enabling massive data breach.',
340
355
  severity: 'critical',
356
+ levelId: 1,
341
357
  category: 'information_disclosure',
342
358
  scanner: 'sensitive-path-scout',
343
359
  cvss: {
@@ -357,11 +373,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
357
373
  // MEDIUM - API & SERVICE EXPOSURE
358
374
  // ========================================
359
375
  [error_codes_js_1.VulnerabilityCode.SENS_MED_SWAGGER_DOCS]: {
360
- id: 104,
376
+ id: 516,
361
377
  code: error_codes_js_1.VulnerabilityCode.SENS_MED_SWAGGER_DOCS,
362
378
  title: 'Swagger/OpenAPI Documentation Exposed',
363
379
  description: 'API documentation (swagger.json, openapi.yaml) is publicly accessible revealing complete API structure including all endpoints, parameters, authentication methods, and data models which aids attackers in understanding and exploiting the API systematically.',
364
380
  severity: 'low',
381
+ levelId: 4,
365
382
  category: 'information_disclosure',
366
383
  scanner: 'sensitive-path-scout',
367
384
  cvss: {
@@ -378,11 +395,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
378
395
  remediation: 'Protect API documentation with authentication if it should be internal. Ensure publicly documented APIs have proper authorization. Remove internal endpoints from public docs.',
379
396
  },
380
397
  [error_codes_js_1.VulnerabilityCode.SENS_MED_PROMETHEUS_METRICS]: {
381
- id: 105,
398
+ id: 517,
382
399
  code: error_codes_js_1.VulnerabilityCode.SENS_MED_PROMETHEUS_METRICS,
383
400
  title: 'Prometheus Metrics Endpoint Exposed',
384
401
  description: 'Prometheus metrics endpoint (/metrics) is publicly accessible exposing application performance data, error rates, request patterns, resource usage, and potentially business metrics that reveal internal operations and aid in planning attacks.',
385
402
  severity: 'medium',
403
+ levelId: 3,
386
404
  category: 'information_disclosure',
387
405
  scanner: 'sensitive-path-scout',
388
406
  cvss: {
@@ -399,11 +417,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
399
417
  remediation: 'Restrict metrics endpoint to internal network or Prometheus server IPs. Use separate port for metrics collection. Implement authentication if external access is required.',
400
418
  },
401
419
  [error_codes_js_1.VulnerabilityCode.SENS_MED_ADMIN_PANEL]: {
402
- id: 106,
420
+ id: 518,
403
421
  code: error_codes_js_1.VulnerabilityCode.SENS_MED_ADMIN_PANEL,
404
422
  title: 'Admin Panel Publicly Accessible',
405
423
  description: 'Administrative interface is accessible from the public internet without IP restrictions, enabling brute force attacks against admin credentials and exposing sensitive management functionality that should be restricted to internal networks only.',
406
424
  severity: 'medium',
425
+ levelId: 3,
407
426
  category: 'access_control',
408
427
  scanner: 'sensitive-path-scout',
409
428
  cvss: {
@@ -420,11 +439,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
420
439
  remediation: 'Restrict admin panel access to VPN or internal IP ranges. Implement strong multi-factor authentication. Use rate limiting and account lockout. Consider separate admin domain.',
421
440
  },
422
441
  [error_codes_js_1.VulnerabilityCode.SENS_MED_SOURCE_MAP]: {
423
- id: 107,
442
+ id: 519,
424
443
  code: error_codes_js_1.VulnerabilityCode.SENS_MED_SOURCE_MAP,
425
444
  title: 'JavaScript Source Maps Exposed',
426
445
  description: 'JavaScript source map files (.js.map) are publicly accessible allowing attackers to view original unminified source code including comments, variable names, internal logic, and potentially security-sensitive implementation details.',
427
446
  severity: 'low',
447
+ levelId: 4,
428
448
  category: 'information_disclosure',
429
449
  scanner: 'sensitive-path-scout',
430
450
  cvss: {
@@ -444,11 +464,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
444
464
  // EXTENDED SENSITIVE PATH EXPOSURES
445
465
  // ========================================
446
466
  [error_codes_js_1.VulnerabilityCode.SENS_MED_UN_PROTECTED_CONFIG_JSON]: {
447
- id: 203,
467
+ id: 520,
448
468
  code: error_codes_js_1.VulnerabilityCode.SENS_MED_UN_PROTECTED_CONFIG_JSON,
449
469
  title: 'Un Protected Config JSON',
450
470
  description: 'The application exposes un protected config json in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
451
471
  severity: 'medium',
472
+ levelId: 3,
452
473
  category: 'information_disclosure',
453
474
  scanner: 'sensitive-path-scout',
454
475
  cvss: {
@@ -465,11 +486,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
465
486
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
466
487
  },
467
488
  [error_codes_js_1.VulnerabilityCode.SENS_HIGH_WEB_SERVER_CONFIGURATION_FILE_DETECTED]: {
468
- id: 109,
489
+ id: 521,
469
490
  code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_WEB_SERVER_CONFIGURATION_FILE_DETECTED,
470
491
  title: 'Web Server Configuration File Detected',
471
492
  description: 'The application exposes web server configuration file detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
472
493
  severity: 'high',
494
+ levelId: 2,
473
495
  category: 'information_disclosure',
474
496
  scanner: 'sensitive-path-scout',
475
497
  cvss: {
@@ -486,11 +508,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
486
508
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
487
509
  },
488
510
  [error_codes_js_1.VulnerabilityCode.SENS_HIGH_APPSETTINGS_JSON_EXPOSED]: {
489
- id: 110,
511
+ id: 522,
490
512
  code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_APPSETTINGS_JSON_EXPOSED,
491
513
  title: 'Appsettings JSON Exposed',
492
514
  description: 'The application exposes appsettings json exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
493
515
  severity: 'high',
516
+ levelId: 2,
494
517
  category: 'information_disclosure',
495
518
  scanner: 'sensitive-path-scout',
496
519
  cvss: {
@@ -507,11 +530,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
507
530
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
508
531
  },
509
532
  [error_codes_js_1.VulnerabilityCode.SENS_HIGH_SPRING_CONFIG_EXPOSED]: {
510
- id: 111,
533
+ id: 523,
511
534
  code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_SPRING_CONFIG_EXPOSED,
512
535
  title: 'Spring Config Exposed',
513
536
  description: 'The application exposes spring config exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
514
537
  severity: 'high',
538
+ levelId: 2,
515
539
  category: 'information_disclosure',
516
540
  scanner: 'sensitive-path-scout',
517
541
  cvss: {
@@ -528,11 +552,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
528
552
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
529
553
  },
530
554
  [error_codes_js_1.VulnerabilityCode.SENS_HIGH_NPMRC_EXPOSED]: {
531
- id: 112,
555
+ id: 524,
532
556
  code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_NPMRC_EXPOSED,
533
557
  title: 'Npmrc Exposed',
534
558
  description: 'The application exposes npmrc exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
535
559
  severity: 'high',
560
+ levelId: 2,
536
561
  category: 'information_disclosure',
537
562
  scanner: 'sensitive-path-scout',
538
563
  cvss: {
@@ -549,11 +574,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
549
574
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
550
575
  },
551
576
  [error_codes_js_1.VulnerabilityCode.SENS_LOW_TOML_PROJECT_FILE_EXPOSED]: {
552
- id: 113,
577
+ id: 525,
553
578
  code: error_codes_js_1.VulnerabilityCode.SENS_LOW_TOML_PROJECT_FILE_EXPOSED,
554
579
  title: 'TOML Project File Exposed',
555
580
  description: 'The application exposes toml project file exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
556
581
  severity: 'low',
582
+ levelId: 4,
557
583
  category: 'information_disclosure',
558
584
  scanner: 'sensitive-path-scout',
559
585
  cvss: {
@@ -570,11 +596,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
570
596
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
571
597
  },
572
598
  [error_codes_js_1.VulnerabilityCode.SENS_HIGH_RAILS_DATABASE_YML_EXPOSED]: {
573
- id: 114,
599
+ id: 526,
574
600
  code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_RAILS_DATABASE_YML_EXPOSED,
575
601
  title: 'Rails Database YML Exposed',
576
602
  description: 'The application exposes rails database yml exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
577
603
  severity: 'high',
604
+ levelId: 2,
578
605
  category: 'information_disclosure',
579
606
  scanner: 'sensitive-path-scout',
580
607
  cvss: {
@@ -591,11 +618,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
591
618
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
592
619
  },
593
620
  [error_codes_js_1.VulnerabilityCode.SENS_HIGH_DRUPAL_SETTINGS_PHP_EXPOSED]: {
594
- id: 115,
621
+ id: 527,
595
622
  code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_DRUPAL_SETTINGS_PHP_EXPOSED,
596
623
  title: 'Drupal Settings PHP Exposed',
597
624
  description: 'The application exposes drupal settings php exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
598
625
  severity: 'high',
626
+ levelId: 2,
599
627
  category: 'information_disclosure',
600
628
  scanner: 'sensitive-path-scout',
601
629
  cvss: {
@@ -612,11 +640,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
612
640
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
613
641
  },
614
642
  [error_codes_js_1.VulnerabilityCode.SENS_HIGH_MAGENTO_ENV_PHP_EXPOSED]: {
615
- id: 116,
643
+ id: 528,
616
644
  code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_MAGENTO_ENV_PHP_EXPOSED,
617
645
  title: 'Magento Env PHP Exposed',
618
646
  description: 'The application exposes magento env php exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
619
647
  severity: 'high',
648
+ levelId: 2,
620
649
  category: 'information_disclosure',
621
650
  scanner: 'sensitive-path-scout',
622
651
  cvss: {
@@ -633,11 +662,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
633
662
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
634
663
  },
635
664
  [error_codes_js_1.VulnerabilityCode.SENS_HIGH_JOLOKIA_EXPOSED]: {
636
- id: 117,
665
+ id: 529,
637
666
  code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_JOLOKIA_EXPOSED,
638
667
  title: 'Jolokia Exposed',
639
668
  description: 'The application exposes jolokia exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
640
669
  severity: 'high',
670
+ levelId: 2,
641
671
  category: 'information_disclosure',
642
672
  scanner: 'sensitive-path-scout',
643
673
  cvss: {
@@ -654,11 +684,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
654
684
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
655
685
  },
656
686
  [error_codes_js_1.VulnerabilityCode.SENS_HIGH_SVN_WORKING_COPY_DATABASE_EXPOSED]: {
657
- id: 118,
687
+ id: 530,
658
688
  code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_SVN_WORKING_COPY_DATABASE_EXPOSED,
659
689
  title: 'SVN Working Copy Database Exposed',
660
690
  description: 'The application exposes svn working copy database exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
661
691
  severity: 'high',
692
+ levelId: 2,
662
693
  category: 'information_disclosure',
663
694
  scanner: 'sensitive-path-scout',
664
695
  cvss: {
@@ -675,11 +706,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
675
706
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
676
707
  },
677
708
  [error_codes_js_1.VulnerabilityCode.SENS_HIGH_SUBVERSION_REPOSITORY_DETECTED]: {
678
- id: 119,
709
+ id: 531,
679
710
  code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_SUBVERSION_REPOSITORY_DETECTED,
680
711
  title: 'Subversion Repository Detected',
681
712
  description: 'The application exposes subversion repository detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
682
713
  severity: 'high',
714
+ levelId: 2,
683
715
  category: 'information_disclosure',
684
716
  scanner: 'sensitive-path-scout',
685
717
  cvss: {
@@ -696,11 +728,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
696
728
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
697
729
  },
698
730
  [error_codes_js_1.VulnerabilityCode.SENS_MED_MERCURIAL_REPOSITORY_FOUND]: {
699
- id: 120,
731
+ id: 532,
700
732
  code: error_codes_js_1.VulnerabilityCode.SENS_MED_MERCURIAL_REPOSITORY_FOUND,
701
733
  title: 'Mercurial Repository Found',
702
734
  description: 'The application exposes mercurial repository found in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
703
735
  severity: 'medium',
736
+ levelId: 3,
704
737
  category: 'information_disclosure',
705
738
  scanner: 'sensitive-path-scout',
706
739
  cvss: {
@@ -717,11 +750,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
717
750
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
718
751
  },
719
752
  [error_codes_js_1.VulnerabilityCode.SENS_MED_MERCURIAL_HGRC_EXPOSED]: {
720
- id: 121,
753
+ id: 533,
721
754
  code: error_codes_js_1.VulnerabilityCode.SENS_MED_MERCURIAL_HGRC_EXPOSED,
722
755
  title: 'Mercurial Hgrc Exposed',
723
756
  description: 'The application exposes mercurial hgrc exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
724
757
  severity: 'medium',
758
+ levelId: 3,
725
759
  category: 'information_disclosure',
726
760
  scanner: 'sensitive-path-scout',
727
761
  cvss: {
@@ -738,11 +772,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
738
772
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
739
773
  },
740
774
  [error_codes_js_1.VulnerabilityCode.SENS_MED_CVS_ROOT_EXPOSED]: {
741
- id: 122,
775
+ id: 534,
742
776
  code: error_codes_js_1.VulnerabilityCode.SENS_MED_CVS_ROOT_EXPOSED,
743
777
  title: 'CVS Root Exposed',
744
778
  description: 'The application exposes cvs root exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
745
779
  severity: 'medium',
780
+ levelId: 3,
746
781
  category: 'information_disclosure',
747
782
  scanner: 'sensitive-path-scout',
748
783
  cvss: {
@@ -759,11 +794,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
759
794
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
760
795
  },
761
796
  [error_codes_js_1.VulnerabilityCode.SENS_MED_CVS_ENTRIES_EXPOSED]: {
762
- id: 123,
797
+ id: 535,
763
798
  code: error_codes_js_1.VulnerabilityCode.SENS_MED_CVS_ENTRIES_EXPOSED,
764
799
  title: 'CVS Entries Exposed',
765
800
  description: 'The application exposes cvs entries exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
766
801
  severity: 'medium',
802
+ levelId: 3,
767
803
  category: 'information_disclosure',
768
804
  scanner: 'sensitive-path-scout',
769
805
  cvss: {
@@ -780,11 +816,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
780
816
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
781
817
  },
782
818
  [error_codes_js_1.VulnerabilityCode.SENS_MED_BAZAAR_REPO_EXPOSED]: {
783
- id: 124,
819
+ id: 536,
784
820
  code: error_codes_js_1.VulnerabilityCode.SENS_MED_BAZAAR_REPO_EXPOSED,
785
821
  title: 'Bazaar Repo Exposed',
786
822
  description: 'The application exposes bazaar repo exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
787
823
  severity: 'medium',
824
+ levelId: 3,
788
825
  category: 'information_disclosure',
789
826
  scanner: 'sensitive-path-scout',
790
827
  cvss: {
@@ -801,11 +838,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
801
838
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
802
839
  },
803
840
  [error_codes_js_1.VulnerabilityCode.SENS_HIGH_SPRING_BOOT_THREAD_DUMP_EXPOSED]: {
804
- id: 125,
841
+ id: 537,
805
842
  code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_SPRING_BOOT_THREAD_DUMP_EXPOSED,
806
843
  title: 'Spring Boot Thread Dump Exposed',
807
844
  description: 'The application exposes spring boot thread dump exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
808
845
  severity: 'high',
846
+ levelId: 2,
809
847
  category: 'information_disclosure',
810
848
  scanner: 'sensitive-path-scout',
811
849
  cvss: {
@@ -822,11 +860,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
822
860
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
823
861
  },
824
862
  [error_codes_js_1.VulnerabilityCode.SENS_HIGH_REDIS_RDB_DUMP_DETECTED]: {
825
- id: 126,
863
+ id: 538,
826
864
  code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_REDIS_RDB_DUMP_DETECTED,
827
865
  title: 'Redis Rdb Dump Detected',
828
866
  description: 'The application exposes redis rdb dump detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
829
867
  severity: 'high',
868
+ levelId: 2,
830
869
  category: 'information_disclosure',
831
870
  scanner: 'sensitive-path-scout',
832
871
  cvss: {
@@ -843,11 +882,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
843
882
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
844
883
  },
845
884
  [error_codes_js_1.VulnerabilityCode.SENS_LOW_ATLASSIAN_BITBUCKET_PIPELINES_CONFIGURATION_DETECTED]: {
846
- id: 127,
885
+ id: 539,
847
886
  code: error_codes_js_1.VulnerabilityCode.SENS_LOW_ATLASSIAN_BITBUCKET_PIPELINES_CONFIGURATION_DETECTED,
848
887
  title: 'Atlassian Bitbucket Pipelines Configuration Detected',
849
888
  description: 'The application exposes atlassian bitbucket pipelines configuration detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
850
889
  severity: 'low',
890
+ levelId: 4,
851
891
  category: 'information_disclosure',
852
892
  scanner: 'sensitive-path-scout',
853
893
  cvss: {
@@ -864,11 +904,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
864
904
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
865
905
  },
866
906
  [error_codes_js_1.VulnerabilityCode.SENS_LOW_AZURE_PIPELINES_CONFIGURATION_DETECTED]: {
867
- id: 128,
907
+ id: 540,
868
908
  code: error_codes_js_1.VulnerabilityCode.SENS_LOW_AZURE_PIPELINES_CONFIGURATION_DETECTED,
869
909
  title: 'AZURE Pipelines Configuration Detected',
870
910
  description: 'The application exposes azure pipelines configuration detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
871
911
  severity: 'low',
912
+ levelId: 4,
872
913
  category: 'information_disclosure',
873
914
  scanner: 'sensitive-path-scout',
874
915
  cvss: {
@@ -885,11 +926,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
885
926
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
886
927
  },
887
928
  [error_codes_js_1.VulnerabilityCode.SENS_LOW_AWS_CODE_BUILD_BUILDSPEC_DETECTED]: {
888
- id: 129,
929
+ id: 541,
889
930
  code: error_codes_js_1.VulnerabilityCode.SENS_LOW_AWS_CODE_BUILD_BUILDSPEC_DETECTED,
890
931
  title: 'AWS Code Build Buildspec Detected',
891
932
  description: 'The application exposes aws code build buildspec detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
892
933
  severity: 'low',
934
+ levelId: 4,
893
935
  category: 'information_disclosure',
894
936
  scanner: 'sensitive-path-scout',
895
937
  cvss: {
@@ -906,11 +948,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
906
948
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
907
949
  },
908
950
  [error_codes_js_1.VulnerabilityCode.SENS_LOW_GITHUB_ACTIONS_WORKFLOW_DETECTED]: {
909
- id: 130,
951
+ id: 542,
910
952
  code: error_codes_js_1.VulnerabilityCode.SENS_LOW_GITHUB_ACTIONS_WORKFLOW_DETECTED,
911
953
  title: 'Github Actions Workflow Detected',
912
954
  description: 'The application exposes github actions workflow detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
913
955
  severity: 'low',
956
+ levelId: 4,
914
957
  category: 'information_disclosure',
915
958
  scanner: 'sensitive-path-scout',
916
959
  cvss: {
@@ -927,11 +970,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
927
970
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
928
971
  },
929
972
  [error_codes_js_1.VulnerabilityCode.SENS_MED_DOCKER_COMPOSE_CONFIGURATION_DETECTED]: {
930
- id: 131,
973
+ id: 543,
931
974
  code: error_codes_js_1.VulnerabilityCode.SENS_MED_DOCKER_COMPOSE_CONFIGURATION_DETECTED,
932
975
  title: 'Docker Compose Configuration Detected',
933
976
  description: 'The application exposes docker compose configuration detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
934
977
  severity: 'medium',
978
+ levelId: 3,
935
979
  category: 'information_disclosure',
936
980
  scanner: 'sensitive-path-scout',
937
981
  cvss: {
@@ -948,11 +992,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
948
992
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
949
993
  },
950
994
  [error_codes_js_1.VulnerabilityCode.SENS_HIGH_TRACE_AXD]: {
951
- id: 132,
995
+ id: 544,
952
996
  code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_TRACE_AXD,
953
997
  title: 'Trace Axd',
954
998
  description: 'The application exposes trace axd in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
955
999
  severity: 'high',
1000
+ levelId: 2,
956
1001
  category: 'information_disclosure',
957
1002
  scanner: 'sensitive-path-scout',
958
1003
  cvss: {
@@ -969,11 +1014,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
969
1014
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
970
1015
  },
971
1016
  [error_codes_js_1.VulnerabilityCode.SENS_HIGH_ELMAH_AXD_EXPOSED]: {
972
- id: 133,
1017
+ id: 545,
973
1018
  code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_ELMAH_AXD_EXPOSED,
974
1019
  title: 'Elmah Axd Exposed',
975
1020
  description: 'The application exposes elmah axd exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
976
1021
  severity: 'high',
1022
+ levelId: 2,
977
1023
  category: 'information_disclosure',
978
1024
  scanner: 'sensitive-path-scout',
979
1025
  cvss: {
@@ -990,11 +1036,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
990
1036
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
991
1037
  },
992
1038
  [error_codes_js_1.VulnerabilityCode.SENS_MED_LARAVEL_LOG_VIEWER_ENABLED]: {
993
- id: 134,
1039
+ id: 546,
994
1040
  code: error_codes_js_1.VulnerabilityCode.SENS_MED_LARAVEL_LOG_VIEWER_ENABLED,
995
1041
  title: 'Laravel Log Viewer Enabled',
996
1042
  description: 'The application exposes laravel log viewer enabled in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
997
1043
  severity: 'medium',
1044
+ levelId: 3,
998
1045
  category: 'information_disclosure',
999
1046
  scanner: 'sensitive-path-scout',
1000
1047
  cvss: {
@@ -1011,11 +1058,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1011
1058
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1012
1059
  },
1013
1060
  [error_codes_js_1.VulnerabilityCode.SENS_MED_APACHE_HTACCESS_FILE_DETECTED]: {
1014
- id: 135,
1061
+ id: 547,
1015
1062
  code: error_codes_js_1.VulnerabilityCode.SENS_MED_APACHE_HTACCESS_FILE_DETECTED,
1016
1063
  title: 'Apache Htaccess File Detected',
1017
1064
  description: 'The application exposes apache htaccess file detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1018
1065
  severity: 'medium',
1066
+ levelId: 3,
1019
1067
  category: 'information_disclosure',
1020
1068
  scanner: 'sensitive-path-scout',
1021
1069
  cvss: {
@@ -1032,11 +1080,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1032
1080
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1033
1081
  },
1034
1082
  [error_codes_js_1.VulnerabilityCode.SENS_MED_APACHE_SERVER_INFO_EXPOSED]: {
1035
- id: 136,
1083
+ id: 548,
1036
1084
  code: error_codes_js_1.VulnerabilityCode.SENS_MED_APACHE_SERVER_INFO_EXPOSED,
1037
1085
  title: 'Apache Server Info Exposed',
1038
1086
  description: 'The application exposes apache server info exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1039
1087
  severity: 'medium',
1088
+ levelId: 3,
1040
1089
  category: 'information_disclosure',
1041
1090
  scanner: 'sensitive-path-scout',
1042
1091
  cvss: {
@@ -1053,11 +1102,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1053
1102
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1054
1103
  },
1055
1104
  [error_codes_js_1.VulnerabilityCode.SENS_HIGH_SQLITE_DATABASE_DETECTED]: {
1056
- id: 137,
1105
+ id: 549,
1057
1106
  code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_SQLITE_DATABASE_DETECTED,
1058
1107
  title: 'Sqlite Database Detected',
1059
1108
  description: 'The application exposes sqlite database detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1060
1109
  severity: 'high',
1110
+ levelId: 2,
1061
1111
  category: 'information_disclosure',
1062
1112
  scanner: 'sensitive-path-scout',
1063
1113
  cvss: {
@@ -1074,11 +1124,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1074
1124
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1075
1125
  },
1076
1126
  [error_codes_js_1.VulnerabilityCode.SENS_MED_PACKAGE_DEPENDENCIES_DETECTED]: {
1077
- id: 138,
1127
+ id: 550,
1078
1128
  code: error_codes_js_1.VulnerabilityCode.SENS_MED_PACKAGE_DEPENDENCIES_DETECTED,
1079
1129
  title: 'Package Dependencies Detected',
1080
1130
  description: 'The application exposes package dependencies detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1081
1131
  severity: 'medium',
1132
+ levelId: 3,
1082
1133
  category: 'information_disclosure',
1083
1134
  scanner: 'sensitive-path-scout',
1084
1135
  cvss: {
@@ -1095,11 +1146,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1095
1146
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1096
1147
  },
1097
1148
  [error_codes_js_1.VulnerabilityCode.SENS_MED_PHP_COMPOSER_DEPENDENCIES_DETECTED]: {
1098
- id: 139,
1149
+ id: 551,
1099
1150
  code: error_codes_js_1.VulnerabilityCode.SENS_MED_PHP_COMPOSER_DEPENDENCIES_DETECTED,
1100
1151
  title: 'PHP Composer Dependencies Detected',
1101
1152
  description: 'The application exposes php composer dependencies detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1102
1153
  severity: 'medium',
1154
+ levelId: 3,
1103
1155
  category: 'information_disclosure',
1104
1156
  scanner: 'sensitive-path-scout',
1105
1157
  cvss: {
@@ -1116,11 +1168,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1116
1168
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1117
1169
  },
1118
1170
  [error_codes_js_1.VulnerabilityCode.SENS_LOW_PYTHON_REQUIREMENTS_DETECTED]: {
1119
- id: 140,
1171
+ id: 552,
1120
1172
  code: error_codes_js_1.VulnerabilityCode.SENS_LOW_PYTHON_REQUIREMENTS_DETECTED,
1121
1173
  title: 'Python Requirements Detected',
1122
1174
  description: 'The application exposes python requirements detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1123
1175
  severity: 'low',
1176
+ levelId: 4,
1124
1177
  category: 'information_disclosure',
1125
1178
  scanner: 'sensitive-path-scout',
1126
1179
  cvss: {
@@ -1137,11 +1190,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1137
1190
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1138
1191
  },
1139
1192
  [error_codes_js_1.VulnerabilityCode.SENS_HIGH_AWS_CONFIG_EXPOSED]: {
1140
- id: 141,
1193
+ id: 553,
1141
1194
  code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_AWS_CONFIG_EXPOSED,
1142
1195
  title: 'AWS Config Exposed',
1143
1196
  description: 'The application exposes aws config exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1144
1197
  severity: 'high',
1198
+ levelId: 2,
1145
1199
  category: 'information_disclosure',
1146
1200
  scanner: 'sensitive-path-scout',
1147
1201
  cvss: {
@@ -1158,11 +1212,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1158
1212
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1159
1213
  },
1160
1214
  [error_codes_js_1.VulnerabilityCode.SENS_HIGH_AZURE_CREDENTIALS_EXPOSED]: {
1161
- id: 142,
1215
+ id: 554,
1162
1216
  code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_AZURE_CREDENTIALS_EXPOSED,
1163
1217
  title: 'AZURE Credentials Exposed',
1164
1218
  description: 'The application exposes azure credentials exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1165
1219
  severity: 'high',
1220
+ levelId: 2,
1166
1221
  category: 'information_disclosure',
1167
1222
  scanner: 'sensitive-path-scout',
1168
1223
  cvss: {
@@ -1179,11 +1234,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1179
1234
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1180
1235
  },
1181
1236
  [error_codes_js_1.VulnerabilityCode.SENS_HIGH_HELM_VALUES_EXPOSED]: {
1182
- id: 143,
1237
+ id: 555,
1183
1238
  code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_HELM_VALUES_EXPOSED,
1184
1239
  title: 'Helm Values Exposed',
1185
1240
  description: 'The application exposes helm values exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1186
1241
  severity: 'high',
1242
+ levelId: 2,
1187
1243
  category: 'information_disclosure',
1188
1244
  scanner: 'sensitive-path-scout',
1189
1245
  cvss: {
@@ -1200,11 +1256,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1200
1256
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1201
1257
  },
1202
1258
  [error_codes_js_1.VulnerabilityCode.SENS_MED_SSH_PUBLIC_KEY_EXPOSED]: {
1203
- id: 144,
1259
+ id: 556,
1204
1260
  code: error_codes_js_1.VulnerabilityCode.SENS_MED_SSH_PUBLIC_KEY_EXPOSED,
1205
1261
  title: 'SSH Public Key Exposed',
1206
1262
  description: 'The application exposes ssh public key exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1207
1263
  severity: 'medium',
1264
+ levelId: 3,
1208
1265
  category: 'information_disclosure',
1209
1266
  scanner: 'sensitive-path-scout',
1210
1267
  cvss: {
@@ -1221,11 +1278,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1221
1278
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1222
1279
  },
1223
1280
  [error_codes_js_1.VulnerabilityCode.SENS_MED_SSL_CERTIFICATE_EXPOSED]: {
1224
- id: 145,
1281
+ id: 557,
1225
1282
  code: error_codes_js_1.VulnerabilityCode.SENS_MED_SSL_CERTIFICATE_EXPOSED,
1226
1283
  title: 'SSL Certificate Exposed',
1227
1284
  description: 'The application exposes ssl certificate exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1228
1285
  severity: 'medium',
1286
+ levelId: 3,
1229
1287
  category: 'information_disclosure',
1230
1288
  scanner: 'sensitive-path-scout',
1231
1289
  cvss: {
@@ -1242,11 +1300,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1242
1300
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1243
1301
  },
1244
1302
  [error_codes_js_1.VulnerabilityCode.SENS_MED_GRAPH_QL_ENDPOINT_EXPOSED]: {
1245
- id: 146,
1303
+ id: 558,
1246
1304
  code: error_codes_js_1.VulnerabilityCode.SENS_MED_GRAPH_QL_ENDPOINT_EXPOSED,
1247
1305
  title: 'Graph Ql Endpoint Exposed',
1248
1306
  description: 'The application exposes graph ql endpoint exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1249
1307
  severity: 'medium',
1308
+ levelId: 3,
1250
1309
  category: 'information_disclosure',
1251
1310
  scanner: 'sensitive-path-scout',
1252
1311
  cvss: {
@@ -1263,11 +1322,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1263
1322
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1264
1323
  },
1265
1324
  [error_codes_js_1.VulnerabilityCode.SENS_MED_GRAPHI_QL_EXPOSED]: {
1266
- id: 147,
1325
+ id: 559,
1267
1326
  code: error_codes_js_1.VulnerabilityCode.SENS_MED_GRAPHI_QL_EXPOSED,
1268
1327
  title: 'Graphi Ql Exposed',
1269
1328
  description: 'The application exposes graphi ql exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1270
1329
  severity: 'medium',
1330
+ levelId: 3,
1271
1331
  category: 'information_disclosure',
1272
1332
  scanner: 'sensitive-path-scout',
1273
1333
  cvss: {
@@ -1284,11 +1344,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1284
1344
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1285
1345
  },
1286
1346
  [error_codes_js_1.VulnerabilityCode.SENS_MED_TERRAFORM_LOCK_EXPOSED]: {
1287
- id: 148,
1347
+ id: 560,
1288
1348
  code: error_codes_js_1.VulnerabilityCode.SENS_MED_TERRAFORM_LOCK_EXPOSED,
1289
1349
  title: 'Terraform Lock Exposed',
1290
1350
  description: 'The application exposes terraform lock exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1291
1351
  severity: 'medium',
1352
+ levelId: 3,
1292
1353
  category: 'information_disclosure',
1293
1354
  scanner: 'sensitive-path-scout',
1294
1355
  cvss: {
@@ -1305,11 +1366,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1305
1366
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1306
1367
  },
1307
1368
  [error_codes_js_1.VulnerabilityCode.SENS_HIGH_TERRAFORM_VARS_EXPOSED]: {
1308
- id: 149,
1369
+ id: 561,
1309
1370
  code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_TERRAFORM_VARS_EXPOSED,
1310
1371
  title: 'Terraform Vars Exposed',
1311
1372
  description: 'The application exposes terraform vars exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1312
1373
  severity: 'high',
1374
+ levelId: 2,
1313
1375
  category: 'information_disclosure',
1314
1376
  scanner: 'sensitive-path-scout',
1315
1377
  cvss: {
@@ -1326,11 +1388,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1326
1388
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1327
1389
  },
1328
1390
  [error_codes_js_1.VulnerabilityCode.SENS_MED_ERROR_LOG_EXPOSED]: {
1329
- id: 150,
1391
+ id: 562,
1330
1392
  code: error_codes_js_1.VulnerabilityCode.SENS_MED_ERROR_LOG_EXPOSED,
1331
1393
  title: 'Error Log Exposed',
1332
1394
  description: 'The application exposes error log exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1333
1395
  severity: 'medium',
1396
+ levelId: 3,
1334
1397
  category: 'information_disclosure',
1335
1398
  scanner: 'sensitive-path-scout',
1336
1399
  cvss: {
@@ -1347,11 +1410,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1347
1410
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1348
1411
  },
1349
1412
  [error_codes_js_1.VulnerabilityCode.SENS_MED_ACCESS_LOG_EXPOSED]: {
1350
- id: 151,
1413
+ id: 563,
1351
1414
  code: error_codes_js_1.VulnerabilityCode.SENS_MED_ACCESS_LOG_EXPOSED,
1352
1415
  title: 'Access Log Exposed',
1353
1416
  description: 'The application exposes access log exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1354
1417
  severity: 'medium',
1418
+ levelId: 3,
1355
1419
  category: 'information_disclosure',
1356
1420
  scanner: 'sensitive-path-scout',
1357
1421
  cvss: {
@@ -1368,11 +1432,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1368
1432
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1369
1433
  },
1370
1434
  [error_codes_js_1.VulnerabilityCode.SENS_MED_DEBUG_LOG_EXPOSED]: {
1371
- id: 152,
1435
+ id: 564,
1372
1436
  code: error_codes_js_1.VulnerabilityCode.SENS_MED_DEBUG_LOG_EXPOSED,
1373
1437
  title: 'Debug Log Exposed',
1374
1438
  description: 'The application exposes debug log exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1375
1439
  severity: 'medium',
1440
+ levelId: 3,
1376
1441
  category: 'information_disclosure',
1377
1442
  scanner: 'sensitive-path-scout',
1378
1443
  cvss: {
@@ -1389,11 +1454,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1389
1454
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1390
1455
  },
1391
1456
  [error_codes_js_1.VulnerabilityCode.SENS_MED_APPLICATION_LOG_EXPOSED]: {
1392
- id: 153,
1457
+ id: 565,
1393
1458
  code: error_codes_js_1.VulnerabilityCode.SENS_MED_APPLICATION_LOG_EXPOSED,
1394
1459
  title: 'Application Log Exposed',
1395
1460
  description: 'The application exposes application log exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1396
1461
  severity: 'medium',
1462
+ levelId: 3,
1397
1463
  category: 'information_disclosure',
1398
1464
  scanner: 'sensitive-path-scout',
1399
1465
  cvss: {
@@ -1410,11 +1476,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1410
1476
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1411
1477
  },
1412
1478
  [error_codes_js_1.VulnerabilityCode.SENS_HIGH_LARAVEL_LOG_EXPOSED]: {
1413
- id: 154,
1479
+ id: 566,
1414
1480
  code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_LARAVEL_LOG_EXPOSED,
1415
1481
  title: 'Laravel Log Exposed',
1416
1482
  description: 'The application exposes laravel log exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1417
1483
  severity: 'high',
1484
+ levelId: 2,
1418
1485
  category: 'information_disclosure',
1419
1486
  scanner: 'sensitive-path-scout',
1420
1487
  cvss: {
@@ -1431,11 +1498,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1431
1498
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1432
1499
  },
1433
1500
  [error_codes_js_1.VulnerabilityCode.SENS_HIGH_WORD_PRESS_DEBUG_LOG_EXPOSED]: {
1434
- id: 155,
1501
+ id: 567,
1435
1502
  code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_WORD_PRESS_DEBUG_LOG_EXPOSED,
1436
1503
  title: 'Word Press Debug Log Exposed',
1437
1504
  description: 'The application exposes word press debug log exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1438
1505
  severity: 'high',
1506
+ levelId: 2,
1439
1507
  category: 'information_disclosure',
1440
1508
  scanner: 'sensitive-path-scout',
1441
1509
  cvss: {
@@ -1452,11 +1520,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1452
1520
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1453
1521
  },
1454
1522
  [error_codes_js_1.VulnerabilityCode.SENS_HIGH_ADMINER_EXPOSED]: {
1455
- id: 156,
1523
+ id: 568,
1456
1524
  code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_ADMINER_EXPOSED,
1457
1525
  title: 'Adminer Exposed',
1458
1526
  description: 'The application exposes adminer exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1459
1527
  severity: 'high',
1528
+ levelId: 2,
1460
1529
  category: 'information_disclosure',
1461
1530
  scanner: 'sensitive-path-scout',
1462
1531
  cvss: {
@@ -1473,11 +1542,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1473
1542
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1474
1543
  },
1475
1544
  [error_codes_js_1.VulnerabilityCode.SENS_MED_WSDL_EXPOSED]: {
1476
- id: 157,
1545
+ id: 569,
1477
1546
  code: error_codes_js_1.VulnerabilityCode.SENS_MED_WSDL_EXPOSED,
1478
1547
  title: 'WSDL Exposed',
1479
1548
  description: 'The application exposes wsdl exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1480
1549
  severity: 'medium',
1550
+ levelId: 3,
1481
1551
  category: 'information_disclosure',
1482
1552
  scanner: 'sensitive-path-scout',
1483
1553
  cvss: {
@@ -1494,11 +1564,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1494
1564
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1495
1565
  },
1496
1566
  [error_codes_js_1.VulnerabilityCode.SENS_HIGH_DEBUG_ENDPOINT_EXPOSED]: {
1497
- id: 158,
1567
+ id: 570,
1498
1568
  code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_DEBUG_ENDPOINT_EXPOSED,
1499
1569
  title: 'Debug Endpoint Exposed',
1500
1570
  description: 'The application exposes debug endpoint exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1501
1571
  severity: 'high',
1572
+ levelId: 2,
1502
1573
  category: 'information_disclosure',
1503
1574
  scanner: 'sensitive-path-scout',
1504
1575
  cvss: {
@@ -1515,11 +1586,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1515
1586
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1516
1587
  },
1517
1588
  [error_codes_js_1.VulnerabilityCode.SENS_HIGH_GO_DEBUG_VARS_EXPOSED]: {
1518
- id: 159,
1589
+ id: 571,
1519
1590
  code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_GO_DEBUG_VARS_EXPOSED,
1520
1591
  title: 'Go Debug Vars Exposed',
1521
1592
  description: 'The application exposes go debug vars exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1522
1593
  severity: 'high',
1594
+ levelId: 2,
1523
1595
  category: 'information_disclosure',
1524
1596
  scanner: 'sensitive-path-scout',
1525
1597
  cvss: {
@@ -1536,11 +1608,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1536
1608
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1537
1609
  },
1538
1610
  [error_codes_js_1.VulnerabilityCode.SENS_HIGH_GO_PPROF_EXPOSED]: {
1539
- id: 160,
1611
+ id: 572,
1540
1612
  code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_GO_PPROF_EXPOSED,
1541
1613
  title: 'Go Pprof Exposed',
1542
1614
  description: 'The application exposes go pprof exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1543
1615
  severity: 'high',
1616
+ levelId: 2,
1544
1617
  category: 'information_disclosure',
1545
1618
  scanner: 'sensitive-path-scout',
1546
1619
  cvss: {
@@ -1557,11 +1630,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1557
1630
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1558
1631
  },
1559
1632
  [error_codes_js_1.VulnerabilityCode.SENS_MED_WORD_PRESS_XML_RPC_EXPOSED]: {
1560
- id: 161,
1633
+ id: 573,
1561
1634
  code: error_codes_js_1.VulnerabilityCode.SENS_MED_WORD_PRESS_XML_RPC_EXPOSED,
1562
1635
  title: 'Word Press XML Rpc Exposed',
1563
1636
  description: 'The application exposes word press xml rpc exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1564
1637
  severity: 'medium',
1638
+ levelId: 3,
1565
1639
  category: 'information_disclosure',
1566
1640
  scanner: 'sensitive-path-scout',
1567
1641
  cvss: {
@@ -1578,11 +1652,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1578
1652
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1579
1653
  },
1580
1654
  [error_codes_js_1.VulnerabilityCode.SENS_LOW_TEST_ENDPOINT_EXPOSED]: {
1581
- id: 162,
1655
+ id: 574,
1582
1656
  code: error_codes_js_1.VulnerabilityCode.SENS_LOW_TEST_ENDPOINT_EXPOSED,
1583
1657
  title: 'Test Endpoint Exposed',
1584
1658
  description: 'The application exposes test endpoint exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1585
1659
  severity: 'low',
1660
+ levelId: 4,
1586
1661
  category: 'information_disclosure',
1587
1662
  scanner: 'sensitive-path-scout',
1588
1663
  cvss: {
@@ -1599,11 +1674,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1599
1674
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1600
1675
  },
1601
1676
  [error_codes_js_1.VulnerabilityCode.SENS_LOW_STAGING_ENDPOINT_EXPOSED]: {
1602
- id: 163,
1677
+ id: 575,
1603
1678
  code: error_codes_js_1.VulnerabilityCode.SENS_LOW_STAGING_ENDPOINT_EXPOSED,
1604
1679
  title: 'Staging Endpoint Exposed',
1605
1680
  description: 'The application exposes staging endpoint exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1606
1681
  severity: 'low',
1682
+ levelId: 4,
1607
1683
  category: 'information_disclosure',
1608
1684
  scanner: 'sensitive-path-scout',
1609
1685
  cvss: {
@@ -1620,11 +1696,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1620
1696
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1621
1697
  },
1622
1698
  [error_codes_js_1.VulnerabilityCode.SENS_LOW_EDITOR_BACKUP_FILE_DETECTED]: {
1623
- id: 164,
1699
+ id: 576,
1624
1700
  code: error_codes_js_1.VulnerabilityCode.SENS_LOW_EDITOR_BACKUP_FILE_DETECTED,
1625
1701
  title: 'Editor Backup File Detected',
1626
1702
  description: 'The application exposes editor backup file detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1627
1703
  severity: 'low',
1704
+ levelId: 4,
1628
1705
  category: 'information_disclosure',
1629
1706
  scanner: 'sensitive-path-scout',
1630
1707
  cvss: {
@@ -1641,11 +1718,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1641
1718
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1642
1719
  },
1643
1720
  [error_codes_js_1.VulnerabilityCode.SENS_LOW_VIM_SWAP_FILE_DETECTED]: {
1644
- id: 165,
1721
+ id: 577,
1645
1722
  code: error_codes_js_1.VulnerabilityCode.SENS_LOW_VIM_SWAP_FILE_DETECTED,
1646
1723
  title: 'VIM Swap File Detected',
1647
1724
  description: 'The application exposes vim swap file detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1648
1725
  severity: 'low',
1726
+ levelId: 4,
1649
1727
  category: 'information_disclosure',
1650
1728
  scanner: 'sensitive-path-scout',
1651
1729
  cvss: {
@@ -1662,11 +1740,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1662
1740
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1663
1741
  },
1664
1742
  [error_codes_js_1.VulnerabilityCode.SENS_LOW_DIRECTORY_LISTING_ENABLED]: {
1665
- id: 166,
1743
+ id: 578,
1666
1744
  code: error_codes_js_1.VulnerabilityCode.SENS_LOW_DIRECTORY_LISTING_ENABLED,
1667
1745
  title: 'Directory Listing Enabled',
1668
1746
  description: 'The application exposes directory listing enabled in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1669
1747
  severity: 'low',
1748
+ levelId: 4,
1670
1749
  category: 'information_disclosure',
1671
1750
  scanner: 'sensitive-path-scout',
1672
1751
  cvss: {
@@ -1683,11 +1762,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1683
1762
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1684
1763
  },
1685
1764
  [error_codes_js_1.VulnerabilityCode.SENS_HIGH_AZURE_STORAGE_CONFIG_EXPOSED]: {
1686
- id: 167,
1765
+ id: 579,
1687
1766
  code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_AZURE_STORAGE_CONFIG_EXPOSED,
1688
1767
  title: 'AZURE Storage Config Exposed',
1689
1768
  description: 'The application exposes azure storage config exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1690
1769
  severity: 'high',
1770
+ levelId: 2,
1691
1771
  category: 'information_disclosure',
1692
1772
  scanner: 'sensitive-path-scout',
1693
1773
  cvss: {
@@ -1704,11 +1784,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1704
1784
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1705
1785
  },
1706
1786
  [error_codes_js_1.VulnerabilityCode.SENS_HIGH_MONGO_RC_EXPOSED]: {
1707
- id: 168,
1787
+ id: 580,
1708
1788
  code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_MONGO_RC_EXPOSED,
1709
1789
  title: 'Mongo Rc Exposed',
1710
1790
  description: 'The application exposes mongo rc exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1711
1791
  severity: 'high',
1792
+ levelId: 2,
1712
1793
  category: 'information_disclosure',
1713
1794
  scanner: 'sensitive-path-scout',
1714
1795
  cvss: {
@@ -1725,11 +1806,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1725
1806
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1726
1807
  },
1727
1808
  [error_codes_js_1.VulnerabilityCode.SENS_LOW_AWSSAM_TEMPLATE_EXPOSED]: {
1728
- id: 169,
1809
+ id: 581,
1729
1810
  code: error_codes_js_1.VulnerabilityCode.SENS_LOW_AWSSAM_TEMPLATE_EXPOSED,
1730
1811
  title: 'Awssam Template Exposed',
1731
1812
  description: 'The application exposes awssam template exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1732
1813
  severity: 'low',
1814
+ levelId: 4,
1733
1815
  category: 'information_disclosure',
1734
1816
  scanner: 'sensitive-path-scout',
1735
1817
  cvss: {
@@ -1746,11 +1828,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1746
1828
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1747
1829
  },
1748
1830
  [error_codes_js_1.VulnerabilityCode.SENS_LOW_SERVERLESS_CONFIG_EXPOSED]: {
1749
- id: 170,
1831
+ id: 582,
1750
1832
  code: error_codes_js_1.VulnerabilityCode.SENS_LOW_SERVERLESS_CONFIG_EXPOSED,
1751
1833
  title: 'Serverless Config Exposed',
1752
1834
  description: 'The application exposes serverless config exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1753
1835
  severity: 'low',
1836
+ levelId: 4,
1754
1837
  category: 'information_disclosure',
1755
1838
  scanner: 'sensitive-path-scout',
1756
1839
  cvss: {
@@ -1767,11 +1850,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
1767
1850
  remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
1768
1851
  },
1769
1852
  [error_codes_js_1.VulnerabilityCode.SENS_LOW_CLOUD_FORMATION_TEMPLATE_EXPOSED]: {
1770
- id: 171,
1853
+ id: 583,
1771
1854
  code: error_codes_js_1.VulnerabilityCode.SENS_LOW_CLOUD_FORMATION_TEMPLATE_EXPOSED,
1772
1855
  title: 'Cloud Formation Template Exposed',
1773
1856
  description: 'The application exposes cloud formation template exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1774
1857
  severity: 'low',
1858
+ levelId: 4,
1775
1859
  category: 'information_disclosure',
1776
1860
  scanner: 'sensitive-path-scout',
1777
1861
  cvss: {